Most enterprises are running a mix of new and old applications and platforms. This includes legacy apps that can’t be easily retired and cutting-ed...
If you lock your front door but leave a basement window open, that’s where the burglars will go. Similarly, placing a shiny new padlock on a front ...
You can’t stop what you can’t see. And attackers have found an area to exploit that conventional cyber security tools cannot see. This area is appl...
In medieval days, knights in shining armor could defend the drawbridge as the main point of entry to the castle. Under fierce siege, the king could...
Companies beware: The FBI warns running Windows 7 systems without security updates is high hacking risk
A favored OS by many, the End of Life (EOL)...
2020 continues to dish out unforeseen difficulties and challenges, many at devastating levels. In the realm of cybersecurity, it’s been no differen...
Brilliance Security Magazine, May 21, 2020, Article by Willy Leichter, Virsec
Subscribe to Blog
Get timely insight about server workload protection, runtime visibility, and defend against attacks – known and unknown.
- Security News
- Cyber Attack
- application aware workload protection
- application aware protection
- runtime protection
- Cyber Resilience
- Cyber Security
- Remote Code Execution
- RCE Attack
- industrial control system
- Public Sector
- SolarWinds Attack
- Zero Trust
- Acer Ransomware Attack
- Cloud Security
- Container Protection
- Kaseya supply chain ransomware attack
- MS Exchange Attack
- Memory Protection
- National Vulnerability Database
- Protect Application Workloads
- REvil ransomware
- Virsec Security Research Lab
- Water Utility Attack
- legacy applications